Passive Image Forensic Method to Detect Resampling Forgery inDigital Images
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: The digital images are becoming important part in the field of information forensics and security,because of the popularity of image editing tools, digital images can be tampered in a very efficient mannerwithout leaving any visual clue. As a consequence, the content of digital images cannot be taken as for granted.Therefore it is must to create forensic techniques which is capable of detecting tampering in image. In general,the image forgery technologies often utilizes the scaling, rotation or skewing operations to tamper some regionsin the image, in which the resampling is demanded. Forged area is often resized & rotated to make itproportional with respect to neighboring unforged area. This is called as resampling operation which changescertain characteristics of the pasted portion. By observing the detectable periodic distribution propertiesgenerated from the resampling, propose a method based on the Peak Value Identification Classifier to detect thetampered regions and find the Peak Signal to Noise Ratio (PSNR) to know about quality of resampled image.The experimental results show that the proposed method outperforms the conventional methods in terms ofrecall and precision.
Authors and Affiliations
Amaninder Kaur , Sheenam Malhotra
Novel Hybrid k-D-Apriori Algorithm for Web Usage Mining
Abstract: The Web usage mining is a branch of web mining in which by clustering the datasets, frequently accessed patterns can be obtained for betterment of social portals, websites. The divisive analysis is one of the t...
Enhancing Software Quality Using Agile Techniques
Agile techniques may produce software faster as well as enhance software quality so that they fulfill quality requirements of the product. In this paper we have considered some quality factors and we have shown h...
Energy Efficiency in Key Management of Body Sensor Network
Abstract: In this research, we have developed an algorithm that maintains the shape and integrity of the BioSignalover Body- Sensor Network. A new approach has been experimented successfully using set theoryoperators (un...
Blowfish Algorithm
Abstract: Blowfish is a popular security algorithm that was developed by Bruce Schneier in the advent of the year 1994. The algorithm works on the same line as DES and it consumes block coding with blocks of a size...
Grid Computing- An Emerging Technology that enables large-scale resource sharing
Abstract: In the last few years there has been a rapid exponential increase in computer processing power, data storage and communication. But still there are many complex and computation intensive problems, which c...